2009-10-30 05:01:25 +09:00
|
|
|
<?php
|
|
|
|
/**
|
|
|
|
* StatusNet, the distributed open-source microblogging tool
|
|
|
|
*
|
|
|
|
* Settings for OpenID
|
|
|
|
*
|
|
|
|
* PHP version 5
|
|
|
|
*
|
|
|
|
* LICENCE: This program is free software: you can redistribute it and/or modify
|
|
|
|
* it under the terms of the GNU Affero General Public License as published by
|
|
|
|
* the Free Software Foundation, either version 3 of the License, or
|
|
|
|
* (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
|
|
* GNU Affero General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Affero General Public License
|
|
|
|
* along with this program. If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
*
|
|
|
|
* @category Settings
|
|
|
|
* @package StatusNet
|
|
|
|
* @author Craig Andrews <candrews@integralblue.com>
|
|
|
|
* @copyright 2008-2009 StatusNet, Inc.
|
|
|
|
* @license http://www.fsf.org/licensing/licenses/agpl-3.0.html GNU Affero General Public License version 3.0
|
|
|
|
* @link http://status.net/
|
|
|
|
*/
|
|
|
|
|
|
|
|
if (!defined('STATUSNET') && !defined('LACONICA')) {
|
|
|
|
exit(1);
|
|
|
|
}
|
|
|
|
|
|
|
|
require_once INSTALLDIR.'/lib/action.php';
|
|
|
|
require_once INSTALLDIR.'/plugins/OpenID/openid.php';
|
2009-10-31 02:21:11 +09:00
|
|
|
require_once(INSTALLDIR.'/plugins/OpenID/User_openid_trustroot.php');
|
2009-10-30 05:01:25 +09:00
|
|
|
|
|
|
|
/**
|
|
|
|
* Settings for OpenID
|
|
|
|
*
|
|
|
|
* Lets users add, edit and delete OpenIDs from their account
|
|
|
|
*
|
|
|
|
* @category Settings
|
|
|
|
* @package StatusNet
|
|
|
|
* @author Craig Andrews <candrews@integralblue.com>
|
|
|
|
* @license http://www.fsf.org/licensing/licenses/agpl-3.0.html GNU Affero General Public License version 3.0
|
|
|
|
* @link http://status.net/
|
|
|
|
*/
|
|
|
|
class OpenidserverAction extends Action
|
|
|
|
{
|
2009-10-31 04:33:04 +09:00
|
|
|
var $oserver;
|
|
|
|
|
|
|
|
function prepare($args)
|
|
|
|
{
|
|
|
|
parent::prepare($args);
|
|
|
|
$this->oserver = oid_server();
|
|
|
|
return true;
|
|
|
|
}
|
2009-10-30 05:01:25 +09:00
|
|
|
|
|
|
|
function handle($args)
|
|
|
|
{
|
|
|
|
parent::handle($args);
|
2009-10-31 04:33:04 +09:00
|
|
|
$request = $this->oserver->decodeRequest();
|
2009-10-30 05:01:25 +09:00
|
|
|
if (in_array($request->mode, array('checkid_immediate',
|
|
|
|
'checkid_setup'))) {
|
2009-10-31 04:33:04 +09:00
|
|
|
$user = common_current_user();
|
|
|
|
if(!$user){
|
|
|
|
if($request->immediate){
|
|
|
|
//cannot prompt the user to login in immediate mode, so answer false
|
|
|
|
$response = $this->generateDenyResponse($request);
|
|
|
|
}else{
|
|
|
|
/* Go log in, and then come back. */
|
|
|
|
common_set_returnto($_SERVER['REQUEST_URI']);
|
|
|
|
common_redirect(common_local_url('login'));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}else if(common_profile_url($user->nickname) == $request->identity || $request->idSelect()){
|
2009-10-31 02:21:11 +09:00
|
|
|
$user_openid_trustroot = User_openid_trustroot::pkeyGet(
|
2009-10-31 04:33:04 +09:00
|
|
|
array('user_id'=>$user->id, 'trustroot'=>$request->trust_root));
|
2009-10-31 02:21:11 +09:00
|
|
|
if(empty($user_openid_trustroot)){
|
|
|
|
if($request->immediate){
|
|
|
|
//cannot prompt the user to trust this trust root in immediate mode, so answer false
|
2009-10-31 04:33:04 +09:00
|
|
|
$response = $this->generateDenyResponse($request);
|
2009-10-31 02:21:11 +09:00
|
|
|
}else{
|
|
|
|
common_ensure_session();
|
2009-10-31 04:33:04 +09:00
|
|
|
$_SESSION['openid_trust_root'] = $request->trust_root;
|
|
|
|
$allowResponse = $this->generateAllowResponse($request, $user);
|
|
|
|
$this->oserver->encodeResponse($allowResponse); //sign the response
|
|
|
|
$denyResponse = $this->generateDenyResponse($request);
|
|
|
|
$this->oserver->encodeResponse($denyResponse); //sign the response
|
2009-10-31 02:21:11 +09:00
|
|
|
$_SESSION['openid_allow_url'] = $allowResponse->encodeToUrl();
|
|
|
|
$_SESSION['openid_deny_url'] = $denyResponse->encodeToUrl();
|
2009-10-31 04:33:04 +09:00
|
|
|
//ask the user to trust this trust root
|
2009-10-31 02:21:11 +09:00
|
|
|
common_redirect(common_local_url('openidtrust'));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}else{
|
|
|
|
//user has previously authorized this trust root
|
2009-10-31 04:33:04 +09:00
|
|
|
$response = $this->generateAllowResponse($request, $user);
|
|
|
|
//$response = $request->answer(true, null, common_profile_url($user->nickname));
|
2009-10-31 02:21:11 +09:00
|
|
|
}
|
2009-10-30 05:01:25 +09:00
|
|
|
} else if ($request->immediate) {
|
2009-10-31 04:33:04 +09:00
|
|
|
$response = $this->generateDenyResponse($request);
|
2009-10-30 05:01:25 +09:00
|
|
|
} else {
|
|
|
|
//invalid
|
2009-12-09 05:17:11 +09:00
|
|
|
$this->clientError(sprintf(_m('You are not authorized to use the identity %s'),$request->identity),$code=403);
|
2009-10-30 05:01:25 +09:00
|
|
|
}
|
|
|
|
} else {
|
2009-10-31 04:33:04 +09:00
|
|
|
$response = $this->oserver->handleRequest($request);
|
2009-10-30 05:01:25 +09:00
|
|
|
}
|
|
|
|
|
|
|
|
if($response){
|
2009-10-31 04:33:04 +09:00
|
|
|
$response = $this->oserver->encodeResponse($response);
|
|
|
|
if ($response->code != AUTH_OPENID_HTTP_OK) {
|
|
|
|
header(sprintf("HTTP/1.1 %d ", $response->code),
|
|
|
|
true, $response->code);
|
2009-10-30 05:01:25 +09:00
|
|
|
}
|
|
|
|
|
2009-10-31 04:33:04 +09:00
|
|
|
if($response->headers){
|
|
|
|
foreach ($response->headers as $k => $v) {
|
2009-10-30 05:01:25 +09:00
|
|
|
header("$k: $v");
|
|
|
|
}
|
|
|
|
}
|
2009-10-31 04:33:04 +09:00
|
|
|
$this->raw($response->body);
|
2009-10-30 05:01:25 +09:00
|
|
|
}else{
|
2009-12-09 05:17:11 +09:00
|
|
|
$this->clientError(_m('Just an OpenID provider. Nothing to see here, move along...'),$code=500);
|
2009-10-30 05:01:25 +09:00
|
|
|
}
|
|
|
|
}
|
2009-10-31 04:33:04 +09:00
|
|
|
|
|
|
|
function generateAllowResponse($request, $user){
|
|
|
|
$response = $request->answer(true, null, common_profile_url($user->nickname));
|
|
|
|
|
|
|
|
$profile = $user->getProfile();
|
|
|
|
$sreg_data = array(
|
|
|
|
'fullname' => $profile->fullname,
|
|
|
|
'nickname' => $user->nickname,
|
|
|
|
'email' => $user->email,
|
|
|
|
'language' => $user->language,
|
|
|
|
'timezone' => $user->timezone);
|
|
|
|
$sreg_request = Auth_OpenID_SRegRequest::fromOpenIDRequest($request);
|
|
|
|
$sreg_response = Auth_OpenID_SRegResponse::extractResponse(
|
|
|
|
$sreg_request, $sreg_data);
|
|
|
|
$sreg_response->toMessage($response->fields);
|
|
|
|
return $response;
|
|
|
|
}
|
|
|
|
|
|
|
|
function generateDenyResponse($request){
|
|
|
|
$response = $request->answer(false);
|
|
|
|
return $response;
|
|
|
|
}
|
2009-10-30 05:01:25 +09:00
|
|
|
}
|